83 webcasts found
+ 38 past events found
Back to Search Begin New Search Save Search Auto-Notify
Risk, Issue, and Opportunity Management...
How can ServiceNow help end-users comply with the DoD’s Released Management Guide, “DoD Department of Defense Risk, Issue, and Opportunity Management Guide for Defense Acquisition Programs”? During this session, we discussed how customers can both mitigate risk in portfolio management, as well as adhere to the requirements of the Management Guide - all in real-time (as opposed to accessing risk during a project postmortem ass...
Add Favorite
Why Traditional EDR is Still Not Enough...
Attendees of this webinar heard how VMware Carbon Black XDR is the new baseline for serving up the security for organizations today for operational excellence and reducing cost liabilities. With XDR, organizations have been able to experience a number of proven benefits when measured against traditional endpoint security methods, including: Unique capabilities for identifying, prioritizing, and reducing risk Complete coverage: endpoints, work...
Add Favorite
Introduction to Feature Flag Management...
Deploying new applications and software updates is a risky operation for federal agencies that can leave developers scrambling to resolve issues. Feature flag management addresses many of the issues federal agencies face in the development cycle. It can enable greater developer productivity, speed up the development cycle and reduce the risk associated with deployments using continuous integration and continuous deployment (CI/CD) practices....
Add Favorite
Go Beyond IAM: Implementing IGA to Miti...
During this Pathlock and Carahsoft webinar, attendees heard from top security experts on how you can expand your SAP security strategy to layers below the network to include vulnerability management, dynamic authorization (zero trust), and data loss prevention - all from a single platform. Register to view this on-demand recording.
Add Favorite
Bridging Borders: How AI and Public Inf...
This webinar brought together border security and artificial intelligence (AI) experts to explore best practices for integrated border management, with a specific focus on the use of AI and publicly and commercially available information sources to detect and prevent cross-border crime. Participants learned: How AI can improve the effectiveness of border management systems in a myriad of ways, such as by increasing the accuracy of name matchin...
Add Favorite
Mastering Identity Governance: Enhancin...
Many agencies struggle to keep up with recent Executive Orders, Digital Transformation, and Zero Trust Strategies when creating a cohesive platform. Identity is the first pillar of Zero Trust and waiting years to bring together a system that satisfies all your identity-based controls is not an option. UberEther provides the only FedRAMP High and DoD Impact Level 5 platform in a private tenant-managed SaaS environment that can be tailored to y...
Add Favorite
Unraveling Digital Supply Chain Threats...
Attendees of this webinar joined Eclypsium for a discussion around digital supply chain threats, risks, and the hidden challenges that organizations are facing in safeguarding their device supply chains. Some key highlights from this discussion were: The role of Software Bill of Materials (SBOMs) in mitigating vulnerabilities and ensuring supply chain integrity. Practical strategies to tackle supply chain issues head-on, based on eye-opening i...
Add Favorite
Report Card on Risk: Managing Risk in H...
A new generation of faculty and students, technological pressures, rising costs, and emerging risks present a unique set of obstacles for higher education institutions. Watch our on-demand webinar to hear industry experts discuss the risks facing higher education executives today, how an integrated approach to risk management and technology can help manage those risks, and the advantages of leveraging one platform to power innovation and conne...
Add Favorite
Supporting CISA BOD 23-02 with Attack S...
Check out our on-demand webinar with Censys where attendees learned: How to identify CISA BOD 23-02 Understand the risks of remotely accessible management interfaces How Censys found publicly exposed devices
Add Favorite
An Introduction to Advanced Analytics
Watch this Alteryx hands-on-lab for an interactive session on conducting end-to-end analysis. Two Alteryx Sales Engineers, unpacked how federal, state, and local agencies are utilizing data driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. After a brief introduction to the possibilities, attendees get hands-on and learn how to apply the techniques for themselves. Attendees learned...
Add Favorite
Back to Search Begin New Search